Help Net Security
Secure control of unattended servers and computers
Designed to facilitate information access, TeamViewer has optimised its TeamViewer software, which offers a secure, easy to use, permanent connection to servers and computers. …
Centrify secures access and privileges on SUSE Linux Enterprise Server for System z
Centrify announced the Centrify Suite 2008 for Linux on IBM System z, the first Linux supported as a guest OS is SUSE Linux Enterprise Server for System z. With Centrify …
SiteSURV 4.0 cloud web filtering with enhanced features
CyberPatrol announced SiteSURV 4.0, the latest version of its customizable Cloud Managed Service for small and medium business. SiteSURV has improved customization and …
Anti Web bug privacy option in the new iPhone 3.0 Mail.app
According to Wikipedia, a Web bug is an object that is embedded in a web page or e-mail and is usually invisible to the user but allows checking that a user has viewed the …
The security of iPhone OS 3.0
The free iPhone OS 3.0 Software Update includes new features, as well as security updates. The security content of the update is outlined below. CoreGraphics A heap buffer …
Jari OS: Open source microkernel multi-service RTOS
Jari OS is a real-time microkernel operating system which runs in terms of multi-service architecture. Core system consists of its own microkernel muString, core and system …
International telephone hacking conspiracy busted
An indictment was unsealed against three individuals who allegedly hacked into the telephone systems of large corporations and entities in the United States and abroad and …
Wireshark 1.2.0 released
Wireshark is the world’s most popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. Wireshark 1.2.0 is the new stable …
Kantara Initiative reshapes global identity landscape
Members of the global identity and Internet communities today announced the launch of Kantara Initiative, a new global organization formed to bridge enterprise, Web 2.0 and …
iPhone security software: iVault pro
Password and data managers are the most common iPhone security applications. The device is getting more and more users and they want to have secure data on the go. While …
Botnet trading platform for hacked PCs
Finjan’s Malicious Code Research Center (MCRC) managed to research a trading network and botnet, where compromised PCs are bought and sold for profit. In the second …
Multi-factor strong mutual online authentication and transaction validation system
B32Trust’s B-Authenticated leaps ahead of competition by releasing the first multi-factor strong mutual online authentication and transaction validation system. One-way …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations